H04L43/20

Apparatus and method for network automation in wireless communication system

Disclosed is a 5.sup.th generation (5G) or a pre-5G communication system provided to support a higher data transmission rate than that of post-4.sup.th generation (4G) communication systems, such as long term evolution (LTE). A method of operating a network node in a wireless communication system is provided. The method includes receiving, from a plurality of first network nodes, network data, generating first recommendation operation information for a second network node based on the network data, and transmitting, to the second network node, a first analysis result message including the first recommendation operation information.

Control method, related device, and system

A control method includes sending, by a controller, a created context-aware model to a context-aware engine. The context-aware model is used to define a preset control performed when target data meets a trigger condition and to instruct the context-aware engine to send indication information to the controller when the context-aware engine determines that the target data meets the trigger condition. The preset control is used to implement a context-aware function. The indication information is used to indicate that the target data meets the trigger condition. The method also includes receiving, by the controller, the indication information. The method further includes performing, by the controller, the preset control based on the indication information.

Tracking image senders on client devices
11557016 · 2023-01-17 ·

Methods and systems for tracking image senders using client devices are described herein. A computing system may receive an image containing a first watermark vector corresponding to a user account of an image sender. The computing system may convert the image to a frequency domain image that contains the first watermark vector. From the frequency domain image, the computing system may identify the first watermark vector. The computing system may compare the first watermark vector to each of a plurality of stored watermark vectors, each corresponding to a known user account, to determine a probability of a match. The computing system may determine the user account of the sender of the image by determining which of the plurality of stored watermark vectors has a highest probability of a match, and may send, to a workplace administrator platform, an indication of the user account.

SLICE INTENT EFFICIENCY ASSURANCE AND ENHANCEMENT IN ENTERPRISE PRIVATE 5G NETWORK

An approach to configure enterprise wireless mobile network slices. A method includes receiving slice definition information representative of a network slice, the slice definition information including an expected slice efficiency index of the network slice, provisioning the network slice, consistent with the slice definition information, in a wireless network, receiving telemetry corresponding to operational metrics of an instance of the network slice that is used by one or more devices in the wireless network, calculating an actual slice efficiency index for the instance of the network slice based on the telemetry corresponding to the operation metrics of the instance of the network slice, determining whether the expected slice efficiency index differs from the actual slice efficiency index by a predetermined threshold, and indicating a course of action to cause the actual slice efficiency index to more closely align with the expected slice efficiency index.

Dynamic service chaining and late binding
11595240 · 2023-02-28 · ·

A visibility platform can be used to monitor traffic traversing private cloud infrastructures and/or public cloud infrastructures. In some instances, the traffic is provided to a set of network services that are accessible to the visibility platform. These network services can be provisioned in a serial or parallel fashion. Network service chaining can be used to ensure that traffic streams skip unnecessary network services and receive only those network services that are needed. For example, an email service chain can include virus, spam, and phishing detection, while a video streaming service chain can include traffic shaping policies to satisfy quality of service (QoS) guarantees. When the visibility platform is represented as a graph that makes use of action sets, network service chains can be readily created or destroyed on demand.

Methods and systems for loosely coupled PCIe service proxy over an IP network

PCIe devices installed in host computers communicating with service nodes can provide virtualized and high availability PCIe functions to host computer workloads. The PCIe device can receive a PCIe TLP encapsulated in a PCIe DLLP via a PCIe bus. The TLP includes a TLP address value, a TLP requester identifier, and a TLP type. The PCIe device can terminate the PCIe transaction by sending a DLLP ACK message to the host computer in response to receiving the TLP. The TLP packet can be used to create a workload request capsule that includes a request type indicator, an address offset, and a workload request identifier. A workload request packet that includes the workload request capsule can be sent to a virtualized service endpoint. The service node, implementing the virtualized service endpoint, receives a workload response packet that includes the workload request identifier and a workload response payload.

Resource fairness enforcement in shared IO interfaces
11593136 · 2023-02-28 · ·

Described are platforms, systems, and methods for resource fairness enforcement. In one aspect, a programmable input output (IO) device comprises a memory unit, the memory unit having instructions stored thereon which, when executed by the programmable IO device, cause the programmable IO device to perform operations comprising: receiving an input from a logical interface (LIF); determining, by at least one meter, a metric regarding at least one resource used during a processing of the input through a programmable pipeline; and regulating additional input received from the LIF based on the metric and a threshold for the at least one resource.

System and method for autonomous data center operation and healing
11704189 · 2023-07-18 · ·

Methods and systems for autonomous computing comprising processing historical data to analyze a past performance, collecting data from a plurality of connected devices over a network, synchronizing the collected data from the plurality of connected devices with the processed historical data. Based on the synchronized data, methods and systems disclosed include detecting an alert (error/fault) condition in one or more of the plurality of connected devices, based on the detected alert condition, triggering the delivery of the detected alert condition to an automated network operations center (NOC), and matching the determined alert condition to a historical alert condition by the network operations center. Based on the matching, methods and systems include determining a corrective action, and based on the determined corrective action, assigning a virtual self-healing module from a plurality of virtual self-healing modules. Finally, a trigger to performance of the determined corrective action by the assigned virtual self-healing module is initiated.

On-demand application-driven network slicing

Disclosed are various embodiments for on-demand application-driven network slicing. In one embodiment, it is determined that an application implemented in a particular computing device has an increased quality-of-service requirement in order to send or receive data via a communications network. The increased quality-of-service requirement is greater than an existing quality-of-service provided to the application by the communications network. The application sends a request that causes capacity in a network slice having the increased quality-of-service requirement in the communications network to be allocated for the application. The data is transmitted to or from the application using the network slice.

Apparatus and method for altruistic scheduling based on reinforcement learning

The present disclosure relates to an apparatus and method of altruistic scheduling based on reinforcement learning. An altruistic scheduling apparatus according to an embodiment of the present disclosure includes: an external scheduling agent for determining a basic resource share for each process based on information of a resource management system; an internal scheduling agent for determining a basic resource allocation schedule for each process based on information including the basic resource share and a resource leftover based on the basic resource allocation schedule; and a leftover scheduling agent for determining a leftover resource allocation schedule based on information including the resource leftover. According to an embodiment of the present disclosure, it may be expected that reinforcement learning will not only mitigate the diminution of fairness of an altruistic scheduler but also further improve other performance indicators such as completion time and efficiency.